NS logs anything that doesn't have the first 3 octets of it's mac address in it's known manufacturer list as a fake ap. It's not really a fake ap, just a fake mac address. Often times though it's not really fake. Usually a peer network, or one where mac addresses have been set, or stuff made by companies who for whatever reason don't have their mac manufacturer id's in ns.

You'll find that a lot of companies that really want full full coverage of their 802.11 deployments will rediculously over-cover an area. If the money is there, the only reason that you wouldn't want to do that is because of channel overlap. Usually though it's possible to keep things from causing too much interference.

NS logs anything that doesn't have the first 3 octets of it's mac address in it's known manufacturer list as a fake ap. It's not really a fake ap, just a fake mac address. Often times though it's not really fake. Usually a peer network, or one where mac addresses have been set, or stuff made by companies who for whatever reason don't have their mac manufacturer id's in ns.

You'll find that a lot of companies that really want full full coverage of their 802.11 deployments will rediculously over-cover an area. If the money is there, the only reason that you wouldn't want to do that is because of channel overlap. Usually though it's possible to keep things from causing too much interference.

Yeah i use CommView for wifi quite a bit and it has a nice little tool that will identify the manufacturer of a network adapters mac address from only the first three octets. its come in handy more than a few times.

WiGLE respects your privacy. To have records of your access point removed from our database, or if you have any questions or suggestions, send an email to: WiGLE-admin[at]WiGLE.net
(please include BSSID (MAC) in removal requests). We're also on IRC: at WiGLE.net:6667